 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 454
Members: 0
Total: 454
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Apache |
 |
Posted: Thu May 20, 2004 10:33 pm |
|
|
Stonecold |
Regular user |

 |
|
Joined: May 20, 2004 |
Posts: 10 |
Location: Virginia |
|
|
 |
 |
 |
|
http://moorer-software.com/apache.htm
Link above has more information. I have tried many things on my server to prevent this particular attack, but the only thing that seems to work is to be in SSH at the time of the attack to ban the IP. Any ideas on a solution to prevent this? All of the solutions in that article were used beforehand. I have a copy program if anyone is interested in testing it out. |
|
|
|
|
Posted: Fri May 21, 2004 10:42 am |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
There is one more issue - if you use a firewall and/or IDS to detect DoS flood packets and have them automatically banning source ip addresses, think about what happens when attackers spoof millions of ip addresses and after that nobody can connect to your server.
This scenario is discussed on various firewall manuals and there is no simple solution... |
|
|
|
|
Posted: Fri May 21, 2004 11:00 am |
|
|
icenix |
Advanced user |

 |
|
Joined: May 13, 2004 |
Posts: 106 |
Location: Australia |
|
|
 |
 |
 |
|
What type of attack?
if its SYN Flooding, with a bit of luck he will get tired of it...
if not there are some firewall rules that can just stop it all together...but ill have to ask my linux mate.. ill get back to you on it.
SYN flooding is a bitch but also effective  |
|
|
|
|
Posted: Fri May 21, 2004 11:09 am |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
In general, I am against any DoS attack and think that it is lame to use them. Only normal reason to use DoS is, if you are trying some clever hack attack and you need to knock out one or more of the machines for some time. |
|
|
|
|
 |
hrmm |
 |
Posted: Fri May 21, 2004 11:12 am |
|
|
icenix |
Advanced user |

 |
|
Joined: May 13, 2004 |
Posts: 106 |
Location: Australia |
|
|
 |
 |
 |
|
DoS in itself is just a spastic hack.
anyone could do it and thats just what pisses me off..
if i could change 1 thing about the way DoS or anything else works it would be:
A: for all source codes (.c and .perl) BREAK UP the script so people cant use it
B: NEVER get anyone to compile a DoS tool into an .exe so some loser can use it.
im sure that would greatly reduce the ammount of people who do these things |
|
|
|
|
 |
 |
|
 |
Posted: Fri May 21, 2004 9:14 pm |
|
|
Stonecold |
Regular user |

 |
|
Joined: May 20, 2004 |
Posts: 10 |
Location: Virginia |
|
|
 |
 |
 |
|
Yeah I have done lots of things to prevent syn flooding on my server. The only real fix is going to have to come from Apache it seems like.
echo 1 > /proc/sys/net/ipv4/tcp_syncookies shifts the load more towards the kernel and less towards apache. This helps out some.
Below is part of a bash script I also use:
Code: | #Reduce DoS'ing ability by reducing timeouts
echo 30 > /proc/sys/net/ipv4/tcp_fin_timeout
echo 1800 > /proc/sys/net/ipv4/tcp_keepalive_time
echo 1 > /proc/sys/net/ipv4/tcp_window_scaling
echo 0 > /proc/sys/net/ipv4/tcp_sack
echo 1280 > /proc/sys/net/ipv4/tcp_max_syn_backlog
#ANTISPOOFING
for a in /proc/sys/net/ipv4/conf/*/rp_filter;
do
echo 1 > $a
done
### chains to DROP too many SYN-s ######
/sbin/iptables -N syn-flood
/sbin/iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN
/sbin/iptables -A syn-flood -j LOG --log-prefix "SYN flood: "
/sbin/iptables -A syn-flood -j DROP |
Quote: | if its SYN Flooding, with a bit of luck he will get tired of it... |
The server I use for hosting sites has not been a target luckily. Only servers that seem to get hit are ones that host "Yahoo Booter" sites, as this apache program has been passed around the Yahoo Messenger community. |
|
|
|
|
 |
www.waraxe.us Forum Index -> All other security holes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|